CVE-2025-28172

6.5 MEDIUM

📋 TL;DR

Grandstream UCM6510 PBX systems running firmware v1.0.20.52 and earlier lack rate limiting on authentication attempts, allowing attackers to brute force credentials. This affects all organizations using vulnerable UCM6510 devices for VoIP communications. Attackers can gain unauthorized access to administrative or user accounts.

💻 Affected Systems

Products:
  • Grandstream UCM6510
Versions: v1.0.20.52 and all earlier versions
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of PBX system leading to call interception, toll fraud, data exfiltration, and lateral movement into connected networks.

🟠

Likely Case

Unauthorized access to administrative interface enabling configuration changes, call routing manipulation, and potential credential harvesting from other accounts.

🟢

If Mitigated

Failed login attempts logged but no successful compromise if strong passwords and network segmentation are implemented.

🌐 Internet-Facing: HIGH - Directly exploitable if device has web interface exposed to internet with default or weak credentials.
🏢 Internal Only: MEDIUM - Requires internal network access but still exploitable by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple brute force tools like Hydra or Burp Suite can exploit this. No authentication required to attempt login.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.0.20.53 or later

Vendor Advisory: http://grandstream.com/support/security-advisories

Restart Required: Yes

Instructions:

1. Download latest firmware from Grandstream support portal. 2. Log into UCM6510 web interface. 3. Navigate to Maintenance > Upgrade. 4. Upload firmware file and click Upgrade. 5. Wait for automatic reboot.

🔧 Temporary Workarounds

Network-based rate limiting

all

Implement rate limiting at network perimeter using firewall or WAF to restrict authentication attempts.

Strong password enforcement

all

Enforce complex passwords (14+ characters, mixed case, numbers, symbols) for all accounts.

🧯 If You Can't Patch

  • Isolate UCM6510 behind firewall with strict access controls, allowing only trusted IPs.
  • Implement account lockout policies via external authentication system if supported.

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface: System Status > Device Information. If version is 1.0.20.52 or lower, device is vulnerable.

Check Version:

curl -k https://<device-ip>/cgi-bin/api-sys_operation?passcode=<passcode>&request=get_info | grep firmware_version

Verify Fix Applied:

After upgrade, verify version shows 1.0.20.53 or higher. Test authentication attempts - system should now limit failed attempts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts from same IP in short timeframe
  • Successful login after many failures

Network Indicators:

  • High volume of POST requests to /login or authentication endpoints
  • Traffic patterns showing credential stuffing

SIEM Query:

source="ucm6510" AND (event_type="auth_failure" AND count > 10 within 5min)

🔗 References

📤 Share & Export